Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4e777455c00f7815bb888322a5ba27b4_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e777455c00f7815bb888322a5ba27b4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
4e777455c00f7815bb888322a5ba27b4_JaffaCakes118
Size
721KB
MD5
4e777455c00f7815bb888322a5ba27b4
SHA1
589db1a1b41365ab72aa8c5561e016b7aee513ef
SHA256
26b5012e78913088aabe1f98d4fc15afb1a3055d3e2ca6a90a73c4bfb863b470
SHA512
edc309e279cd6505eda6a73797438c275c5f3f5e635350eae56d70146ee4086d05a29312956b22fd14f9cba7c939dca850be1d51496f553b6f5f9b7aad7f36c3
SSDEEP
12288:k/5RiKCguYeRyK4qva5kljMjhGAAB+BlPfWgCN1fBKKpb:khMKfuve5k+FrABSNufBxb
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesW
VirtualAlloc
Sleep
FindClose
SuspendThread
ResumeThread
CreateDirectoryA
VirtualFree
InterlockedExchange
SetFileAttributesW
GetLongPathNameW
ExitProcess
GetWindowsDirectoryW
InterlockedIncrement
ResetEvent
CloseHandle
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
ReadFile
GetLastError
GetProcessHeap
TerminateThread
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetProcAddress
GetOEMCP
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapReAlloc
HeapAlloc
TerminateProcess
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
RtlUnwind
WriteFile
MultiByteToWideChar
GetCPInfo
GetACP
SetStdHandle
MoveWindow
SwitchDesktop
ReleaseDC
ShowWindow
MessageBoxA
GetWindowTextW
SelectObject
SysAllocString
SysFreeString
SCardReconnect
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ